PyOTP Documentation. Release PyOTP contributors
|
|
- Erin Patrick
- 6 years ago
- Views:
Transcription
1 PyOTP Documentation Release PyOTP contributors Jun 10, 2017
2
3 Contents 1 Quick overview of using One Time Passwords on your phone 3 2 Installation 5 3 Usage Time-based OTPs Counter-based OTPs Generating a base32 Secret Key Google Authenticator Compatible Working example Links API documentation 9 5 Table of Contents 13 Python Module Index 15 i
4 ii
5 PyOTP Documentation, Release PyOTP is a Python library for generating and verifying one-time passwords. It can be used to implement two-factor (2FA) or multi-factor (MFA) authentication methods in web applications and in other systems that require users to log in. Open MFA standards are defined in RFC 4226 (HOTP: An HMAC-Based One-Time Password Algorithm) and in RFC 6238 (TOTP: Time-Based One-Time Password Algorithm). PyOTP implements server-side support for both of these standards. Client-side support can be enabled by sending authentication codes to users over SMS or (HOTP) or, for TOTP, by instructing users to use Google Authenticator, Authy, or another compatible app. Users can set up auth tokens in their apps easily by using their phone camera to scan otpauth:// QR codes provided by PyOTP. We recommend that implementers read the OWASP Authentication Cheat Sheet and NIST SP : Digital Authentication Guideline for a high level overview of authentication best practices. Contents 1
6 PyOTP Documentation, Release Contents
7 CHAPTER 1 Quick overview of using One Time Passwords on your phone OTPs involve a shared secret, stored both on the phone and the server OTPs can be generated on a phone without internet connectivity OTPs should always be used as a second factor of authentication (if your phone is lost, you account is still secured with a password) Google Authenticator and other OTP client apps allow you to store multiple OTP secrets and provision those using a QR Code 3
8 PyOTP Documentation, Release Chapter 1. Quick overview of using One Time Passwords on your phone
9 CHAPTER 2 Installation pip install pyotp 5
10 PyOTP Documentation, Release Chapter 2. Installation
11 CHAPTER 3 Usage Time-based OTPs totp = pyotp.totp('base32secret3232') totp.now() # => # OTP verified for current time totp.verify(492039) # => True time.sleep(30) totp.verify(492039) # => False Counter-based OTPs hotp = pyotp.hotp('base32secret3232') hotp.at(0) # => hotp.at(1) # => hotp.at(1401) # => # OTP verified with a counter hotp.verify(316439, 1401) # => True hotp.verify(316439, 1402) # => False Generating a base32 Secret Key pyotp.random_base32() # returns a 16 character base32 secret. Compatible with Google Authenticator and other OTP apps 7
12 PyOTP Documentation, Release Google Authenticator Compatible PyOTP works with the Google Authenticator iphone and Android app, as well as other OTP apps like Authy. PyOTP includes the ability to generate provisioning URIs for use with the QR Code scanner built into these MFA client apps: issuer_name= "Secure App") >>> 'otpauth://totp/secure%20app:alice%40google.com?secret=jbswy3dpehpk3pxp& issuer=secure%20app' initial_ count=0, issuer_name="secure App") >>> 'otpauth://hotp/secure%20app:alice%40google.com?secret=jbswy3dpehpk3pxp& issuer=secure%20app&counter=0' This URL can then be rendered as a QR Code (for example, using which can then be scanned and added to the users list of OTP credentials. Working example Scan the following barcode with your phone s OTP app (e.g. Google Authenticator): Now run the following and compare the output: import pyotp totp = pyotp.totp("jbswy3dpehpk3pxp") print("current OTP:", totp.now()) Links Project home page (GitHub) Documentation (Read the Docs) Package distribution (PyPI) Change log RFC 4226: HOTP: An HMAC-Based One-Time Password RFC 6238: TOTP: Time-Based One-Time Password Algorithm ROTP - Original Ruby OTP library by Mark Percival OTPHP - PHP port of ROTP by Le Lag OWASP Authentication Cheat Sheet NIST SP : Digital Authentication Guideline 8 Chapter 3. Usage
13 CHAPTER 4 API documentation class pyotp.totp.totp(*args, **kwargs) Handler for time-based OTP counters. at(for_time, counter_offset=0) Accepts either a Unix timestamp integer or a datetime object. Parameters for_time (int or datetime) the time to generate an OTP for counter_offset the amount of ticks to add to the time counter Returns OTP value Return type str now() Generate the current time OTP Returns OTP value Return type str provisioning_uri(name, issuer_name=none) Returns the provisioning URI for the OTP. This can then be encoded in a QR Code and used to provision an OTP app like Google Authenticator. See also: Parameters name (str) name of the user account issuer_name the name of the OTP issuer; this will be the organization title of the OTP entry in Authenticator Returns provisioning URI Return type str 9
14 PyOTP Documentation, Release verify(otp, for_time=none, valid_window=0) Verifies the OTP passed in against the current time OTP. Parameters otp (str) the OTP to check against for_time (int or datetime) Time to check OTP at (defaults to now) valid_window (int) extends the validity to this many counter ticks before and after the current one Returns True if verification succeeded, False otherwise Return type bool class pyotp.hotp.hotp(s, digits=6, digest=<built-in function openssl_sha1>) Handler for HMAC-based OTP counters. at(count) Generates the OTP for the given count. Parameters count (int) the OTP HMAC counter Returns OTP Return type str provisioning_uri(name, initial_count=0, issuer_name=none) Returns the provisioning URI for the OTP. This can then be encoded in a QR Code and used to provision an OTP app like Google Authenticator. See also: Parameters name (str) name of the user account initial_count (int) starting HMAC counter value, defaults to 0 issuer_name the name of the OTP issuer; this will be the organization title of the OTP entry in Authenticator Returns provisioning URI Return type str verify(otp, counter) Verifies the OTP passed in against the current time OTP. Parameters otp (str) the OTP to check against count (int) the OTP HMAC counter pyotp.utils.build_uri(secret, name, initial_count=none, issuer_name=none, algorithm=none, digits=none, period=none) Returns the provisioning URI for the OTP; works for either TOTP or HOTP. This can then be encoded in a QR Code and used to provision the Google Authenticator app. For module-internal use. See also: Parameters 10 Chapter 4. API documentation
15 PyOTP Documentation, Release secret (str) the hotp/totp secret used to generate the URI name (str) name of the account initial_count (int) starting counter value, defaults to None. If none, the OTP type will be assumed as TOTP. issuer_name (str) the name of the OTP issuer; this will be the organization title of the OTP entry in Authenticator algorithm (str) the algorithm used in the OTP generation. digits (int) the length of the OTP generated code. period (int) the number of seconds the OTP generator is set to expire every code. Returns provisioning uri Return type str pyotp.utils.strings_equal(s1, s2) Timing-attack resistant string comparison. Normal comparison using == will short-circuit on the first mismatching character. This avoids that by scanning the whole string, though we still reveal to a timing attack whether the strings are the same length. 11
16 PyOTP Documentation, Release Chapter 4. API documentation
17 CHAPTER 5 Table of Contents genindex modindex search 13
18 PyOTP Documentation, Release Chapter 5. Table of Contents
19 Python Module Index p pyotp, 9 pyotp.hotp, 10 pyotp.totp, 9 pyotp.utils, 10 15
20 PyOTP Documentation, Release Python Module Index
21 Index A at() (pyotp.hotp.hotp method), 10 at() (pyotp.totp.totp method), 9 B build_uri() (in module pyotp.utils), 10 H HOTP (class in pyotp.hotp), 10 N now() (pyotp.totp.totp method), 9 P provisioning_uri() (pyotp.hotp.hotp method), 10 provisioning_uri() (pyotp.totp.totp method), 9 pyotp (module), 9 pyotp.hotp (module), 10 pyotp.totp (module), 9 pyotp.utils (module), 10 S strings_equal() (in module pyotp.utils), 11 T TOTP (class in pyotp.totp), 9 V verify() (pyotp.hotp.hotp method), 10 verify() (pyotp.totp.totp method), 9 17
Contents. Multi-Factor Authentication Overview. Available MFA Factors
The purpose of this document is to provide National University student Single Sign-On users with instructions for how to configure and use Multi-Factor Authentication. Contents Multi-Factor Authentication
More informationINSTRUCTIONS FOR CREATING YOUR FBBE ACCOUNT
INSTRUCTIONS FOR CREATING YOUR FBBE ACCOUNT If you do not already have one, download a Two Factor Authentication (2FA) app from the app store on your smart device. We strongly encourage you to use the
More informationBarracuda Networks Android Mobile App and Multi-Factor Authentication
Barracuda Networks Android Mobile App and Multi-Factor Authentication This article refers to the Barracuda Networks Android Mobile App version 0.9 or greater, on an Android mobile phone devices running
More informationRapidIdentity Mobile Guide
RapidIdentity Mobile Guide Welcome to the RapidIdentity Mobile Component page. The RapidIdentity Mobile guide describes the installation and configuration options for the RapidIdentity Mobile application.
More informationDevice LinkUp Manual. Android
Device LinkUp Manual Android Version 2.0 Release 1.0.0.2587 April 2016 Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
More informationSignup for Multi-Factor Authentication
What is Multi-Factor Authentication? Multi-Factor Authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring
More informationGoogle Authenticator Guide. SurePassID Authentication Server 2017
Google Authenticator Guide SurePassID Authentication Server 2017 Introduction This technical guide describes how to use the Google Authenticator app to generate One-Time Passwords (OTP) that are compatible
More informationGetting Started New User. To begin, open the Multi-Factor Authentication Service in your inbox.
Getting Started New User To begin, open the Multi-Factor Authentication Service email in your inbox. 1 1 Getting Started New User Click the link https://mfa.baptisthealth.net/portal. This link takes you
More informationprompt Documentation Release Stefan Fischer
prompt Documentation Release 0.4.1 Stefan Fischer Nov 14, 2017 Contents: 1 Examples 1 2 API 3 3 Indices and tables 7 Python Module Index 9 i ii CHAPTER 1 Examples 1. Ask for a floating point number: >>>
More informationBechtel Partner Access User Guide
Bechtel Partner Access User Guide IMPORTANT: For help with this process, please contact the IS&T Service Center or your local IS&T support group: IS&T Service Center Phone: +1-571-392-6767 US Only +1 (800)
More informationUser manual for access to Gasport
User manual for access to Gasport 1. Introduction In this user manual is explained how you can log on to the GTS web-based application Gasport via Multi-Factor Authentication (MFA). Before you can log
More informationMFA (Multi-Factor Authentication) Enrollment Guide
MFA (Multi-Factor Authentication) Enrollment Guide Morristown Medical Center 1. Open Internet Explorer (Windows) or Safari (Mac) 2. Go to the URL: https://aka.ms/mfasetup enter your AHS email address and
More informationUsing Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide
Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure Deployment Guide v1.0 May 2018 Introduction This document describes how to set up Pulse Connect Secure for SP-initiated
More informationQUICK REFERENCE GUIDE. Managed Network Security Portal Multi-Factor Authentication
QUICK REFERENCE GUIDE Managed Network Security Portal Multi-Factor Authentication January 10, 2019 To protect our customers critical data, Windstream Enterprise has added additional security measures to
More informationSurePassID ServicePass User Guide. SurePassID Authentication Server 2017
SurePassID ServicePass User Guide SurePassID Authentication Server 2017 Introduction This technical guide shows how users can manage their SurePassID security tokens that are compatible with SurePassID
More informationGoogle Authenticator User Guide
The Google Authenticator app on your mobile phone will generate time based one time verification codes, each of which is valid only for thirty seconds. These verification codes are used to log in to the
More informationDevice LinkUp User Manual OS X
Device LinkUp User Manual OS X Version 2.0 Release 1.0.0.2002 April 2016 Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationProgressive Authentication in ios
Progressive Authentication in ios Genghis Chau, Denis Plotnikov, Edwin Zhang December 12 th, 2014 1 Overview In today s increasingly mobile-centric world, more people are beginning to use their smartphones
More informationPyJWT Documentation. Release José Padilla
PyJWT Documentation Release 1.6.1 José Padilla Apr 08, 2018 Contents 1 Sponsor 3 2 Installation 5 3 Example Usage 7 4 Command line 9 5 Index 11 5.1 Installation................................................
More informationMFA Instructions. Getting Started. 1. Go to Apps, select Play Store 2. Search for Microsoft Authenticator 3. Click Install
MFA Instructions Getting Started You will need the following: Your smartphone, a computer, and Internet access. Before using MFA your computer will need to be running Office 2016 if you use the full version
More informationHelpdesk Administration Guide Advanced Authentication. Version 5.6
Helpdesk Administration Guide Advanced Authentication Version 5.6 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
More informationMulti-factor Authentication Instructions
What is MFA? Multi-factor Authentication (MFA) is a security measure to confirm your identity in addition to your username and password. It helps in the prevention of unauthorized access to your account.
More informationisupplier Portal Registration & Instructions Last Updated: 22-Aug-17 Level 4 - Public INFRASTRUCTURE MINING & METALS NUCLEAR, SECURITY & ENVIRONMENTAL
INFRASTRUCTURE MINING & METALS NUCLEAR, SECURITY & ENVIRONMENTAL OIL, GAS & CHEMICALS isupplier Portal Registration & Instructions Last Updated: 22-Aug-17 Level 4 - Public Table of Contents 1 New User
More informationMulti-Factor Authentication Enrolment Guide
Multi-Factor Authentication Enrolment Guide How to set up the service and authenticate successfully What is MFA and how does it impact the way I sign into my account or applications? Multi-Factor Authentication
More informationf5-icontrol-rest Documentation
f5-icontrol-rest Documentation Release 1.3.10 F5 Networks Aug 04, 2018 Contents 1 Overview 1 2 Installation 3 2.1 Using Pip................................................. 3 2.2 GitHub..................................................
More informationNetIQ Advanced Authentication Framework. OATH Authentication Provider User's Guide. Version 5.1.0
NetIQ Advanced Authentication Framework OATH Authentication Provider User's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 OATH Authenticator Overview
More informationTable of Content. Two-factor Authentication (2FA) Set-up 2FA _Step 1_ Install the Authenticator App... 1
Table of Content... 1 Set-up 2FA... 1 _Step 1_ Install the Authenticator App... 1 _Step 2_ Add Account to the App... 2 Option 1 :Scan QR Code (Recommended)... 2 Option 2 :Mobile 1-Click Setup... 3 Option
More informationPyZabbixObj Documentation
PyZabbixObj Documentation Release 0.1 Fabio Toscano Aug 26, 2017 Contents Python Module Index 3 i ii PyZabbixObj Documentation, Release 0.1 PyZabbixObj is a Python module for working with Zabbix API,
More informationDjango QR Code Documentation
Django QR Code Documentation Release 0.3.3 Philippe Docourt Nov 12, 2017 Contents: 1 Django QR Code 1 1.1 Installation................................................ 1 1.2 Usage...................................................
More informationRemote Support Two-Factor Authentication
Remote Support Two-Factor Authentication 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property
More informationSurePassID Authenticator Guide. SurePassID Authentication Server 2017
SurePassID Authenticator Guide SurePassID Authentication Server 2017 Introduction This technical guide describes how to use the SurePassID Mobile Authenticator app to generate One- Time Passwords (OTP)
More informationHow to Integrate. REVE Secure 2FA App. with Dashboard.
How to Integrate REVE Secure 2FA App with Dashboard REVE Secure Software Token supports widely deployed mobile platforms like ios, Android, Windows, etc. and uses time-based algorithm to support 2FA. This
More informationSelfService Portal. Step By Step Documentation. This document will show you how to enroll your user account to the SelfService Portal
SelfService Portal Step By Step Documentation This document will show you how to enroll your user account to the SelfService Portal There are three types of Authentication 1. Security Questions 2. Verification
More informationDjango MFA Documentation
Django MFA Documentation Release 1.0 Micro Pyramid Sep 20, 2018 Contents 1 Getting started 3 1.1 Requirements............................................... 3 1.2 Installation................................................
More informationMulti Factor Authentication
Multi Factor Authentication Nick Sherman The University of Toledo 11/28/2017 Introduction Two step verification is an additional security step that helps protect your account by making it harder for other
More informationMFA Pilot Instructions
MFA Pilot Instructions Getting Started You will need the following: Your smartphone, a computer, and Internet access. Before using MFA your computer will need to be running Office 2016. If you are still
More informationHelpdesk Administration Guide Advanced Authentication. Version 6.0
Helpdesk Administration Guide Advanced Authentication Version 6.0 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
More informationOATH-HOTP. Yubico Best Practices Guide. OATH-HOTP: Yubico Best Practices Guide Yubico 2016 Page 1 of 11
OATH-HOTP Yubico Best Practices Guide OATH-HOTP: Yubico Best Practices Guide Yubico 2016 Page 1 of 11 Copyright 2016 Yubico Inc. All rights reserved. Trademarks Disclaimer Yubico and YubiKey are trademarks
More informationSoft Key Setup. The new soft key user must firstly download the CPOMS Authenticator app to their chosen device i.e. smart phone, tablet or ipad.
1. Download the App Soft Key Setup The new soft key user must firstly download the CPOMS Authenticator app to their chosen device i.e. smart phone, tablet or ipad. You can find the CPOMS Authenticator
More informationGetting Started with Duo Security Two-Factor Authentication (2FA)
Getting Started with Duo Security Two-Factor Authentication (2FA) Table of Contents What is Two-Factor Authentication (2FA)?... 1 Why 2FA at Bates College?... 2 2FA Technologies... 3 Duo Protected Resources
More informationDuo Multi-Factor Authentication Enrolling an iphone. Introduction. Enrolling an iphone
Duo Multi-Factor Authentication Enrolling an iphone Introduction Duo is a multi-factor authentication tool chosen by Towson University to help prevent data breaches. Duo is a tool that verifies someone
More informationThe specifications and information in this document are subject to change without notice. Companies, names, and data used
AUTHENTICATION The specifications and information in this document are subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. This document
More informationWebADM and OpenOTP are trademarks of RCDevs. All further trademarks are the property of their respective owners.
CONFIGURE PUSH LOGIN WITH OPENOTP The specifications and information in this document are subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationEstablishing two-factor authentication with Juniper SSL VPN and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Juniper SSL VPN and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA Celestix
More informationIBM Security Access Manager Version June Development topics IBM
IBM Security Access Manager Version 9.0.5 June 2018 Development topics IBM IBM Security Access Manager Version 9.0.5 June 2018 Development topics IBM ii IBM Security Access Manager Version 9.0.5 June
More informationIBM Security Access Manager for Mobile Version Developer topics
IBM Security Access Manager for Mobile Version 8.0.0.5 Developer topics IBM Security Access Manager for Mobile Version 8.0.0.5 Developer topics ii IBM Security Access Manager for Mobile Version 8.0.0.5:
More informationTwo Factor Authentication
Two Factor Authentication On December 15 th 2017 the Costpoint Cloud will require Two Factor Authentication when accessing User Manager and Citrix. Also, users will be required to access Costpoint Enterprise
More informationConfidence Competence Innovation. Secure Login for Jira. User's Guide
Confidence Competence Innovation Secure Login for Jira User's Guide Target Audience This User's Guide is targeted to JIRA users who are working with our secure log- in solution. Motivation Because the
More informationGoogle 2 factor authentication User Guide
Google 2 factor authentication User Guide Description: Updated Date: This guide describes how to setup Two factor authentication for your Google account. March, 2018 Summary ITSC is pleased to launch Two
More informationMulti-factor Authentication Instructions
What is MFA? (MFA) is a security measure to confirm your identity in addition to your username and password. It helps in the prevention of unauthorized access to your account. MFA authentication is typically
More informationQUICK NOTE: MULTI-FACTOR AUTHENTICATION
Overview This Quick Note covers the steps necessary to setup your multi-factor authentication (MFA) account. Multi-factor authentication (MFA) is a method of authentication that requires the use of more
More informationTwo-Factor Authentication Guide Bomgar Remote Support
Two-Factor Authentication Guide Bomgar Remote Support 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
More informationSign in using social media without an EU Login account
EU Login How to authenticate with EU Login EU Login is the entry gate to sign in to different European Commission services and/or other systems. EU Login verifies your identity and allows recovering your
More informationpydrill Documentation
pydrill Documentation Release 0.3.4 Wojciech Nowak Apr 24, 2018 Contents 1 pydrill 3 1.1 Features.................................................. 3 1.2 Installation................................................
More informationbzz Documentation Release Rafael Floriano and Bernardo Heynemann
bzz Documentation Release 0.1.0 Rafael Floriano and Bernardo Heynemann Nov 15, 2017 Contents 1 Getting Started 3 2 Flattening routes 5 3 Indices and tables 7 3.1 Model Hive................................................
More informationCMS-i First Time Activation User Guide
Download Soft Token Application (ios Application) Download Soft Token Application (Android Application) First Time Activation Soft Token Registration Version : 4.0 Last updated : 22 nd February 2019 alrajhicashbiz24seven
More informationHow to Secure SSH with Google Two-Factor Authentication
How to Secure SSH with Google Two-Factor Authentication WELL, SINCE IT IS QUITE COMPLEX TO SET UP, WE VE DECIDED TO DEDICATE A WHOLE BLOG TO THAT PARTICULAR STEP! A few weeks ago we took a look at how
More informationbottle-rest Release 0.5.0
bottle-rest Release 0.5.0 February 18, 2017 Contents 1 API documentation 3 1.1 bottle_rest submodule.......................................... 3 2 What is it 5 2.1 REST in bottle..............................................
More informationWhat do I need to do to use an authentication app on my smartphone?
What is two-factor authentication? Why has SIDN introduced two-factor authentication? When do we have to start using two-factor authentication? How is the log-in procedure changing? What second authentication
More informationEstablishing two-factor authentication with Cisco and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Cisco and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA Celestix Networks
More informationBSE-SINGLE SIGN ON. For Brokers/ Banks/ Mutual Funds
BSE-SINGLE SIGN ON For Brokers/ Banks/ Mutual Funds Contents Introduction:... 2 Features:... 2 Advantages:... 2 On-boarding process.... 3 SSO application Login Process... 7 Authentication via OTP... 7
More informationsanction Documentation
sanction Documentation Release 0.4 Demian Brecht May 14, 2014 Contents 1 Overview 3 2 Quickstart 5 2.1 Instantiation............................................... 5 2.2 Authorization Request..........................................
More informationMulti-factor authentication enrollment guide for Deloitte practitioners
Deloitte OnLine eroom Global Technology Services December 2017 Multi-factor authentication enrollment guide for Deloitte practitioners What is multi-factor authentication (MFA) and how does it impact the
More informationEstablishing two-factor authentication with Barracuda SSL VPN and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Barracuda SSL VPN and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA Celestix
More informationSecure your app with 2FA. Rob Allen ~ April 2017
Secure your app with 2FA Rob Allen ~ @akrabat ~ April 2017 Your users' passwords will be leaked (It might not even be your fault) Passwords have leaked from Sony Zappos JP Morgan Gap Facebook Twitter ebay
More informationTPS Documentation. Release Thomas Roten
TPS Documentation Release 0.1.0 Thomas Roten Sep 27, 2017 Contents 1 TPS: TargetProcess in Python! 3 2 Installation 5 3 Contributing 7 3.1 Types of Contributions..........................................
More informationpython-hologram-api Documentation
python-hologram-api Documentation Release 0.1.6 Victor Yap Oct 27, 2017 Contents 1 python-hologram-api 3 1.1 Installation................................................ 3 1.2 Documentation..............................................
More informationcertbot-dns-rfc2136 Documentation
certbot-dns-rfc2136 Documentation Release 0 Certbot Project Aug 29, 2018 Contents: 1 Named Arguments 3 2 Credentials 5 2.1 Sample BIND configuration....................................... 6 3 Examples
More informationpython-jose Documentation
python-jose Documentation Release 0.2.0 Michael Davis May 21, 2018 Contents 1 Contents 3 1.1 JSON Web Signature........................................... 3 1.2 JSON Web Token............................................
More informationDuo Security Enrollment Guide
Duo Security Enrollment Guide Duo's self-enrollment process makes it easy to register your phone and install the Duo Mobile application on your smartphone or tablet. Supported Browsers: Chrome, Firefox,
More informationIBM Security Access Manager Version 9.0 October Development topics IBM
IBM Security Access Manager Version 9.0 October 2015 Development topics IBM IBM Security Access Manager Version 9.0 October 2015 Development topics IBM ii IBM Security Access Manager Version 9.0 October
More informationVingd API for PHP Documentation
Vingd API for PHP Documentation Release 1.7 Radomir Stevanovic, Vingd Inc. Jul 17, 2017 Contents 1 Vingd 3 1.1 Vingd API for PHP.......................................... 3 1.2 Installation..............................................
More informationTwo Factor Authentication
Two-Factor Authentication is a way to provide an extra layer of security when it comes to accessing accounts. It not only requires the logon password, but also a code that ONLY the authorized user has
More informationDUO SECURITY Integration GUIDE
V1.1 2014-06 Feitian Technologies Co.Ltd Website:www.FTsafe.com Categories 1. About This Document... 1 1.1 Audience... 1 1.2 Feedback... 1 1.3 Overview... 1 1.4 Contact... 1 2. Importing OTP Tokens...
More informationGitHub-Flask Documentation
GitHub-Flask Documentation Release 3.2.0 Cenk Altı Jul 01, 2018 Contents 1 Installation 3 2 Configuration 5 3 Authenticating / Authorizing Users 7 4 Invoking Remote Methods 9 5 Full Example 11 6 API Reference
More informationSecure Remote Access Installation and User Guide
Secure Remote Access Installation and User Guide Version 1.0 Published July 2016 TABLE OF CONTENTS 1 System Requirements...3 1.1 Take Control for Windows...3 1.2 Take Control for OSX...3 2 Configure User
More informationpyshk Documentation Release Jeremy Low
pyshk Documentation Release 1.1.0 Jeremy Low December 20, 2015 Contents 1 Warnings 3 2 Installation 5 3 Authentication Tutorial 7 3.1 Introduction............................................... 7 3.2
More informationPrivileged Remote Access Two-Factor Authentication
Privileged Remote Access Two-Factor Authentication 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property
More informationa) Log in using your credentials. Your User Name will be your address. Enter Password and click <Log On>
Two-Factor Authentication Installation You will need your computer, internet connection and mobile device. Open up your internet browser and go to the website: https://cloud.cetrom.net a) Log in using
More informationMFA Enrollment Guide. Multi-Factor Authentication (MFA) Enrollment guide STAGE Environment
Multi-Factor Authentication (MFA) Enrollment guide STAGE Environment December 2017 00 Table of Contents What is MFA and how does it impact the way I sign into applications? 2 MFA Enrollment Log-in 3 Setup
More informationsainsmart Documentation
sainsmart Documentation Release 0.3.1 Victor Yap Jun 21, 2017 Contents 1 sainsmart 3 1.1 Install................................................... 3 1.2 Usage...................................................
More informationQualys Cloud Platform (VM, PC) v8.x Release Notes
Qualys Cloud Platform (VM, PC) v8.x Release Notes Version 8.18.1 April 1, 2019 This new release of the Qualys Cloud Platform (VM, PC) includes improvements to Vulnerability Management and Policy Compliance.
More informationUser Guide for Client Remote Access. Version 1.2
User Guide for Client Remote Access Version 1.2 Table of Contents PAGE Introduction... 2 Microsoft Multi-Factor Authentication Introduction... 3-4 User Enrollment... 5-8 Accessing Remote Resources Windows
More informationFlask-Twilio Documentation
Flask-Twilio Documentation Release 0.0.6 Leo Singer Mar 02, 2018 Contents 1 Flask-Twilio Installation 1 2 Set Up 3 3 Making a Call 5 4 Sending a Text Message 7 5 Full Example Flask Application 9 6 Configuration
More informationMobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents
MobilePASS SOFTWARE AUTHENTICATION SOLUTIONS Security Features Contents Introduction... 2 Technical Features... 2 Security Features... 3 PIN Protection... 3 Seed Protection... 3 Security Mechanisms per
More informationPRACTICAL PASSWORD AUTHENTICATION ACCORDING TO NIST DRAFT B
PRACTICAL PASSWORD AUTHENTICATION ACCORDING TO NIST DRAFT 800-63B MOTIVATION DATABASE LEAKAGE ADOBE 152,982,479 Encrypted with 3DES ECB Same password == same ciphertext https://nakedsecurity.sophos.com/2013/11/04/anatomy-of-a-password-disaster-adobes-giant-sized-cryptographic-blunder/
More informationflask-jwt Documentation
flask-jwt Documentation Release 0.3.2 Dan Jacob Nov 16, 2017 Contents 1 Links 3 2 Installation 5 3 Quickstart 7 4 Configuration Options 9 5 API 11 6 Changelog 13 6.1 Flask-JWT Changelog..........................................
More informationProtecting Systems with One Time Passwords. Scott Nolin Steve Barnet
Protecting Systems with One Time Passwords Scott Nolin Steve Barnet Introduction Scott Nolin - Head of SSEC Technical Computing Group. Steve Barnet WIPAC/IceCube Sysadmin and fixer of things Increase security
More informationScotiaConnect Registration Quick Reference Guide
ScotiaConnect Registration Quick Reference Guide Table of Contents Physical Token Registration... 2 Digital Token Registration... 4 For Further Assistance... 8 Version 2.0 ScotiaConnect supports two different
More informationDevice LinkUP + VIN. Service + Desktop LP Guide RDP
Device LinkUP + VIN Service + Desktop LP Guide RDP Version 3.0 May 2016 Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
More informationdjango-allauth-2fa Documentation
django-allauth-2fa Documentation Release 0.4.3 Víðir Valberg Guðmundsson, Percipient Networks Apr 25, 2018 Contents: 1 Features 3 2 Compatibility 5 3 Contributing 7 3.1 Running tests...............................................
More informationDOWNLOADING THE CEAS MOBILE VERIFICATION APPLICATION
DOWNLOADING THE CEAS MOBILE VERIFICATION APPLICATION I. Downloading the CEAS ios (iphone) App: The CEAS iphone App is free of charge to install and use. If you have a QR code reader installed on your device
More informationDuo Security Enrollment Guide
Duo Security Enrollment Guide Duo's self-enrollment process makes it easy to register your phone and install the Duo Mobile application on your smartphone or tablet. Supported Browsers: Chrome, Firefox,
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationThis overview document below is for Office 365 Online Migration and Multifactor Authentication Enrollment.
Information Technology Division Email Online Multifactor Authentication Enrollment Last revised: May 2018 Last reviewed: June 2018 This overview document below is for Office 365 Email Online Migration
More informationPulp Python Support Documentation
Pulp Python Support Documentation Release 1.0.1 Pulp Project October 20, 2015 Contents 1 Release Notes 3 1.1 1.0 Release Notes............................................ 3 2 Administrator Documentation
More informationQBS and authentication
QBS works best on Internet Explorer, Edge or Mozilla. Avoid Chrome as some of the screens can appear a little different to what you expect. Please upgrade your version to the latest one QBS and authentication
More informationPython wrapper for Viscosity.app Documentation
Python wrapper for Viscosity.app Documentation Release Paul Kremer March 08, 2014 Contents 1 Python wrapper for Viscosity.app 3 1.1 Features.................................................. 3 2 Installation
More informationClickToCall SkypeTest Documentation
ClickToCall SkypeTest Documentation Release 0.0.1 Andrea Mucci August 04, 2015 Contents 1 Requirements 3 2 Installation 5 3 Database Installation 7 4 Usage 9 5 Contents 11 5.1 REST API................................................
More informationAuthenticatr. Two-factor authentication made simple for Windows network environments. Version 0.9 USER GUIDE
Authenticatr Two-factor authentication made simple for Windows network environments Version 0.9 USER GUIDE Authenticatr Page 1 Contents Contents... 2 Legal Stuff... 3 About Authenticatr... 4 Installation
More information